(2) This manual uses several conventions to highlight certain wordsand phrases and draw attention to specific pieces of information.

(3) In PDF and paper editions, this manual uses typefaces drawn fromthe set. The Liberation Fonts set is also used in HTML editions if theset is installed on your system. If not, alternative but equivalenttypefaces are displayed. Note: Red Hat Enterprise Linux 5 and laterincludes the Liberation Fonts set by default.

(4) Typographic Conventions

(5) Four typographic conventions are used to call attention tospecific words and phrases. These conventions, and the circumstancesthey apply to, are as follows.

(6) Mono-spaced Bold

(7) Used to highlight system input, including shell commands, filenames and paths. Also used to highlight keys and key combinations. Forexample:

(8) To see the contents of the file my_next_bestselling_novel in yourcurrent working directory, enter the "cat my_next_bestselling_novel"command at the shell prompt and press "Enter" to execute the command.

(9) The above includes a file name, a shell command and a key, allpresented in mono-spaced bold and all distinguishable thanks tocontext.

(10) Key combinations can be distinguished from an individual key bythe plus sign that connects each part of a key combination. Forexample:

(11) Press "Enter" to execute the command.

(12) Press "Ctrl+Alt+F2" to switch to a virtual terminal.

(13) The first example highlights a particular key to press. Thesecond example highlights a key combination: a set of three keyspressed simultaneously.

(14) If source code is discussed, class names, methods, functions,variable names and returned values mentioned within a paragraph willbe presented as above, in mono-spaced bold. For example:

(15) File-related classes include <classname>filesystem</classname>for file systems, "file" for files, and "dir" for directories. Eachclass has its own associated set of permissions.

(18) Choose "System->Preferences->Mouse" from the main menu bar tolaunch Mouse Preferences. In the Buttons tab, click the Left-handedmouse check box and click Close to switch the primary mouse buttonfrom the left to the right (making the mouse suitable for use in theleft hand).

(19) To insert a special character into a gedit file, chooseApplications->Accessories->Character Map from the main menu bar. Next,choose Search->Find… from the Character Map menu bar, type the name ofthe character in the Search field and click Next. The character yousought will be highlighted in the Character Table. Double-click thishighlighted character to place it in the Text to copy field and thenclick the Copy button. Now switch back to your document and chooseEdit->Paste from the gedit menu bar.

(23) To connect to a remote machine using ssh, type "sshuser...@domain.name" at a shell prompt. If the remote machine is"example.com" and your username on that machine is john, type "sshjo...@example.com".

(25) To see the version of a currently installed package, use the "rpm-q package" command. It will return a result as follows: package-version-release.

(26) Note the words in bold italics above — username, domain.name,file-system, package, version and release. Each word is a placeholder,either for text you enter when issuing a command or for text displayedby the system.

(27) Aside from standard usage for presenting the title of a work,italics denotes the first use of a new and important term. Forexample:

(28) Publican is a DocBook publishing system.

(29) Pull-quote Conventions

(30) Terminal output and source code listings are set off visuallyfrom the surrounding text.

(31) Output sent to a terminal is set in mono-spaced roman andpresented thus:

(33) Source-code listings are also set in <computeroutput>mono-spacedroman but add syntax highlighting as follows:

(34) Notes and Warnings

(35) Finally, we use three visual styles to draw attention toinformation that might otherwise be overlooked.

(36) Notes are tips, shortcuts or alternative approaches to the taskat hand. Ignoring a note should have no negative consequences, but youmight miss out on a trick that makes your life easier.

(37) Important boxes detail things that are easily missed:configuration changes that only apply to the current session, orservices that need restarting before an update will apply. Ignoring abox labeled 'Important' will not cause data loss but may causeirritation and frustration.

(38) Warnings should not be ignored. Ignoring warnings will mostlikely cause data loss.